keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
2017 Vol. 3, No. 5
Published: 16 May 2017

 
386 Microsoft China: The Implementation of Information Security and Cooperative Strategy
2017 Vol. 3 (5): 386-397 [Abstract] ( 162 ) HTML (1 KB)  PDF  (1668 KB)  ( 209 )
400 Privacy Preserving Cloud Computing—With a Focus on Multimedia Applications
2017 Vol. 3 (5): 400-411 [Abstract] ( 74 ) HTML (1 KB)  PDF  (11157 KB)  ( 47 )
412 Secure Operation Platform for Cloud Service
2017 Vol. 3 (5): 412-417 [Abstract] ( 144 ) HTML (1 KB)  PDF  (5505 KB)  ( 108 )
427 Promoting Information Security Is the Responsibility of the Enterprise
2017 Vol. 3 (5): 427-431 [Abstract] ( 84 ) HTML (1 KB)  PDF  (476 KB)  ( 111 )
432 Study of Security Protection System in Desktop Cloud
2017 Vol. 3 (5): 432-439 [Abstract] ( 66 ) HTML (1 KB)  PDF  (7176 KB)  ( 79 )
440 Trusted Computing: Constructing a New Architecture for Cloud Security
2017 Vol. 3 (5): 440-450 [Abstract] ( 90 ) HTML (1 KB)  PDF  (9099 KB)  ( 96 )
451 A Review on the Technology of Legal Software Protection
Sun Wei
2017 Vol. 3 (5): 451-461 [Abstract] ( 92 ) HTML (1 KB)  PDF  (8338 KB)  ( 70 )
462 A Formal Analysis Method with Forward Reasoning for Cryptographic Protocols
2017 Vol. 3 (5): 462-468 [Abstract] ( 55 ) HTML (1 KB)  PDF  (5238 KB)  ( 119 )
469 Analysis of Host Anomaly Behavior Based on Stream Data Feature Matchinge
Mei-Rong Mei-rongWEI
2017 Vol. 3 (5): 469-476 [Abstract] ( 65 ) HTML (1 KB)  PDF  (6181 KB)  ( 99 )
477 Talking About the Application of the Commercial Cryptography
2017 Vol. 3 (5): 477-480 [Abstract] ( 57 ) HTML (1 KB)  PDF  (723 KB)  ( 152 )
Copyright © Editorial Board of Journal of Information Security Research